With the rapid growth of information technologies, biometrics is being used more and more widely in applications for accessing databases or business systems. These applications need to implement measures to counter th...
详细信息
The Terrestrial Truncked radio (TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. End-to-end encrypted continuous data, such as video, requires synchron...
详细信息
The Terrestrial Truncked radio (TETRA) system uses end-to-end encryption in addition to the air interface encryption to provide enhanced security. End-to-end encrypted continuous data, such as video, requires synchronisation of the key stream at the receiver to the incoming encrypted data stream from the transmitter. The TETRA system uses a synchronisation technique known as frame stealing to provide synchronisation to end-to-end encrypted data. However, the frame stealing process degrades the quality of video and is not suitable for transmission of secure video. This paper proposes an alternative technique called frame insertion, which is more suitable for video. A technique known as fly wheeling is used to recover from synchronisation problems due to dropped data packets. Further, a method of reducing the synchronisation delay in a video stream is also discussed.
The proceedings contains 11 papers. Topics discussed include: cryptography and data securitysystems;mobile telecommunication systems;network protocols;standards;microporcessor chips;cellular telephone systems;and the...
详细信息
The proceedings contains 11 papers. Topics discussed include: cryptography and data securitysystems;mobile telecommunication systems;network protocols;standards;microporcessor chips;cellular telephone systems;and the management of data security.
"The Net" is universally recognised as offering a revolution in communications way beyond the limited applications for which it is currently being used. The opportunities for business, commerce and finance a...
详细信息
"The Net" is universally recognised as offering a revolution in communications way beyond the limited applications for which it is currently being used. The opportunities for business, commerce and finance are particularly exciting. The author discusses why the Internet is failing to live up to these expectations as a commercial medium. No private individual will trust their credit card numbers to an insecure network and big business has even more at stake. One of the first companies to try and address this problem seriously is Netscape Communications who attempted to build a "secure transactions protocol" into their Web browser. However, like many before them, they wrongly perceived the writing of a cryptographically secure system to be a straightforward task whereas in fact, it is a highly specialised one. As a direct result, their system was very publicly and embarrassingly "hacked". We describe by way of a detailed example of what can go wrong, the weaknesses in the design of the cryptographic "security" built into the Netscape browser which led to the algorithm being broken. Some important lessons to be learned from their experience are summarised and some recommendations made (together with associated problems) for the design of genuinely secure systems which will allow the commercial potential of the Internet to be realised to the full.
Private mobile radio (PMR) systems provide two way communications for use in private business applications. Their application may be described as "Teamwork over Distance", enabling groups of users to remain ...
Private mobile radio (PMR) systems provide two way communications for use in private business applications. Their application may be described as "Teamwork over Distance", enabling groups of users to remain in constant communications. PMR systems themselves may be privately owned for the exclusive use of the owner, or owned by a third party with use of the systems leased in a similar way to public telephony networks. These latter systems are referred to as public access mobile radio (PAMR) or shared systems. The paper covers the application of security to present day PMR and PAMR systems, with the provision of such services as confidentiality and authenticity; and discusses the security aspects of the new Trans European Trunked radio (TETRA) system.
To understand the problems that are faced when implementing speech security, it is necessary to review the sort of systems that police forces and security companies have, why the systems themselves are used the way th...
详细信息
To understand the problems that are faced when implementing speech security, it is necessary to review the sort of systems that police forces and security companies have, why the systems themselves are used the way they are, and why protection is needed in any case. Considered as wide area radiosystems, the paper discusses the factors that need to be considered in the design of a speech security system that may be applied to these.
The need for sound security management should not be overlooked. The management of security is a major topic whose importance has been widely recognized. The paper presents a summary of a lecture on the Management of ...
详细信息
The need for sound security management should not be overlooked. The management of security is a major topic whose importance has been widely recognized. The paper presents a summary of a lecture on the Management of security to be presented at the EDPAA 1994 annual conference.
The paper looks at the subject of secure mobile radio communications and the issues that are raised when the right to privacy is tested against the need to know. The issues are illustrated using two major examples: th...
详细信息
The paper looks at the subject of secure mobile radio communications and the issues that are raised when the right to privacy is tested against the need to know. The issues are illustrated using two major examples: the European, private approach;and the US, public approach.
TETRA is currently being standardized by the European Telecommunications Standards Institute's (ETSI) Sub Technical Committee 6 on radio Equipment and systems (RES6). It allows speech and data communications withi...
详细信息
TETRA is currently being standardized by the European Telecommunications Standards Institute's (ETSI) Sub Technical Committee 6 on radio Equipment and systems (RES6). It allows speech and data communications within a closed user group, e.g. a vehicle fleet or emergency services. Unlike most presently available trunked systems, TETRA provides digital transmission, which permits the integration of high quality cryptographic security mechanisms. Results of the projects that have been standardized by ETSI before were used as a work starting point in TETRA. But since public safety forces are expected to form one of the most important user groups for TETRA, a higher level of security had to be considered in the development of its standard.
暂无评论